'DWD 0XVW 'R 1RZ 'LVDVWHU 6$)(7< -XQH·V %X]] ZRUG 7KLQJV … · 2016-11-18 · +duqhww frxqwlhv...

6
This monthly publication provided courtesy of Rob Downs, CEO and President of Managed IT Solutions Get More Free Tips, Tools and Services At Our Web Site: www.ManagedITS.com In less than 60 seconds, you are about to learn 10 things that could save you days – or even weeks – of downtime, not to mention the undue stress on your company, and potentially thousands of dollars lost, due to a data disaster… Use this article as your checklist in a conversation with your IT company to assure that your business has the right plan in place to get back up and running quickly if and when disaster strikes. 1. Keep a written plan. Simply thinking through in ADVANCE what needs to happen when things go south on you, and documenting it, can go a long way toward getting your network back up and running quickly if it gets hacked, flooded or compromised by human error or equipment failure. Outline the types of disasters that could happen, and a step-by-step recovery process. Be sure to include a budget, what to do, who should do it and how. Store printed copies along with key contact information and login details for essential websites 1) in a fireproof safe, 2) off-site at your home, 3) at each key employee’s home and 4) with your IT consultant. 2. Hire a trusted professional to help you. Trying to recover data after a disaster without professional help is business suicide. One misstep can result in weeks of downtime, or permanent data loss. To improve your odds of a quick recovery, work with a pro who has experience in both setting up your plan and helping you recover when a loss occurs. 3. Have a communications plan. What if your employees can’t access your office, e-mail or phone system – how should they communicate with you? Make Our Mission: To build a community of successful minded entrepreneurs that inspires excellence, encourages collaboration and expands the capacity of all members to achieve great things. June’s Buzz-word: SAFETY Edward Eugene “Buzz” Aldrin, Jr. and his two Apollo 11 teammates had a backup plan. He, Neil Armstrong, and Michael Collins signed autographs while in quarantine before their July 16, 1969 lunar launch and sent them to friends to give to their families in case of a tragedy. The idea—sell their autographs posthumously for income. With summer about to swing into high gear, every business-owner needs a fail -safe backup plan to ensure the office will run seamlessly without him or her when the sound of the surf beckons. The Internet and space have many things in common—their grandness and unpredictability-so it’s important to always have a layer of protection and a backup plan. 10 Things You Must Do Now To Prevent A Costly Data Disaster June 2016 Triangle Tech Times /ŶƐŝĚĞƌ dŝƉƐ dŽ DĂŬĞ zŽƵƌ ƵƐŝŶĞƐƐ ZƵŶ &ĂƐƚĞƌ ĂƐŝĞƌ ŶĚ DŽƌĞ WƌŽĮƚĂďůLJ ¨ 92/801 - ,668( ¨ -81( ¨ 7:(17< 6,;7((1

Transcript of 'DWD 0XVW 'R 1RZ 'LVDVWHU 6$)(7< -XQH·V %X]] ZRUG 7KLQJV … · 2016-11-18 · +duqhww frxqwlhv...

Page 1: 'DWD 0XVW 'R 1RZ 'LVDVWHU 6$)(7< -XQH·V %X]] ZRUG 7KLQJV … · 2016-11-18 · +duqhww frxqwlhv %hfn\ vwloo uhfdoov wkh jurzlqj sdlqv ri d frpsdq\ wkdw zdv eruq 6hswhpehu ´,w zdv

This monthly publication provided courtesy of Rob Downs, CEO and President of Managed IT Solutions

Get More Free Tips, Tools and Services At Our Web Site: www.ManagedITS.com

In less than 60 seconds, you are about to learn 10 things that could save you days – or even weeks – of downtime, not to mention the undue stress on your company, and potentially thousands of dollars lost, due to a data disaster… Use this article as your checklist in a conversation with your IT company to assure that your business has the right plan in place to get back up and running quickly if and when disaster strikes. 1. Keep a written plan. Simply

thinking through in ADVANCE what needs to happen when things go south on you, and documenting it, can go a long way toward getting your network back up and running quickly if it gets hacked, flooded or compromised by human error or equipment failure. Outline the types of disasters that could happen, and a step-by-step

recovery process. Be sure to include a budget, what to do, who should do it and how. Store printed copies along with key contact information and login details for essential websites 1) in a fireproof safe, 2) off-site at your home, 3) at each key employee’s home and 4) with your IT consultant.

2. Hire a trusted professional to help you. Trying to recover data after a disaster without professional help is business suicide. One misstep can result in weeks of downtime, or permanent data loss. To improve your odds of a quick recovery, work with a pro who has experience in both setting up your plan and helping you recover when a loss occurs.

3. Have a communications plan. What if your employees can’t access your office, e-mail or phone system – how should they communicate with you? Make

Our Mission: To build a community of successful minded entrepreneurs that inspires e x c e l l e n c e , e n c o u r a g e s collaboration and expands the capacity of all members to achieve great things.

June’s Buzz-word: SAFETY

Edward Eugene “Buzz” Aldrin, Jr. and his two Apollo 11 teammates had a backup plan. He, Neil Armstrong, and Michael Collins signed autographs while in quarantine before their July 16, 1969 lunar launch and sent them to friends to give to their families in case of a tragedy. The idea—sell their autographs posthumously for income. With summer about to swing into high gear, every business-owner needs a fail-safe backup plan to ensure the office will run seamlessly without him or her when the sound of the surf beckons. The Internet and space have many things in common—their grandness and unpredictability-so it’s important to always have a layer of protection and a backup plan.

10 Things You Must Do Now To Prevent A Costly Data

Disaster

June 2016

Triangle Tech Times /ŶƐŝĚĞƌdŝƉƐdŽDĂŬĞzŽƵƌƵƐŝŶĞƐƐZƵŶ&ĂƐƚĞƌ ĂƐŝĞƌŶĚDŽƌĞWƌŽĮƚĂďůLJ

¨ 92/801-,668( ¨ -81( ¨ 7:(17<6,;7((1

Page 2: 'DWD 0XVW 'R 1RZ 'LVDVWHU 6$)(7< -XQH·V %X]] ZRUG 7KLQJV … · 2016-11-18 · +duqhww frxqwlhv %hfn\ vwloo uhfdoov wkh jurzlqj sdlqv ri d frpsdq\ wkdw zdv eruq 6hswhpehu ´,w zdv

Triangle Tech Times June 2016

ǣ · ǡ

͵-ͶǤ · Ͷ͵

Ǥ · -

Ǥ · ǡ

-DzdzǯǤ

&ODLP<RXU)5((&RS\7RGD\DWZZZ0DQDJHG,76FRP9R,3

ǣDzǡ-ϐdz

sure your plan details the alternatives, including MULTIPLE ways to stay in touch.

4. Automate your backups. THE #1 cause of data loss is human error. If your backup system depends on a human being doing something, it’s a recipe for disaster. ALWAYS automate your backups so they run like clockwork.

5. Keep an off-site backup copy of your data. On-site backups are a good first step, but if they get flooded, burned or hacked along with your server, you’re out of luck. ALWAYS maintain a recent copy of your data off-site.

6. Be able to access and manage

your network remotely. You and your staff will be able to keep working if they can’t get into your office. Your IT manager or consultant can quickly handle an emergency or routine maintenance. And you’ll love the

convenience!

7. Image your server. Storing your data off-site is great – but bear in

mind, if your system goes down, the software and architecture that handles all that data must be RESTORED for it to be of any use. Imaging your server creates a replica of the original, saving you an enormous amount of time

and energy in getting your network back in gear. Best of all, you don’t have to worry about losing your preferences, configurations or favorites.

8. Document your network. Network documentation is simply a blueprint of the software, data, systems and hardware that comprise your company’s network. Let your IT manager or consultant create this for you. It’ll save you time and money in the event your network needs to be restored. It also speeds up everyday repairs and maintenance on your network when technicians don’t have to waste time figuring out where things are and how they’re

configured. Plus, it may help with insurance claims in the event of losses due to a disaster.

9. Maintain your system. While fires, flooding and other natural disasters are certainly a risk, it’s ever more likely that you’ll experience downtime due to a virus, worm or hacker attack. That’s why it’s critical to keep your network patched, secure and up-to-date. And don’t forget: deteriorating hardware and corrupted software can wipe you out. Replace and update them as needed to steer clear of this threat.

10. Test, test, test! If you’re going to go to the trouble of setting up a plan, at least make sure it works! Hire an IT pro to test monthly to make sure your systems work properly and your data is secure. After all, the worst time to test your parachute is AFTER you jump out of the plane.

Need help getting this implemented? Contact us by June 30 at 919-848-3259 or [email protected] for a FREE Backup And Disaster Recovery Audit.

Get More Free Tips, Tools and Services At Our Web Site: www.ManagedITS.com

“It’s critical to keep your

network patched, secure and up-to

-date.”

Page 3: 'DWD 0XVW 'R 1RZ 'LVDVWHU 6$)(7< -XQH·V %X]] ZRUG 7KLQJV … · 2016-11-18 · +duqhww frxqwlhv %hfn\ vwloo uhfdoov wkh jurzlqj sdlqv ri d frpsdq\ wkdw zdv eruq 6hswhpehu ´,w zdv

June 2016

Get more free tips, tools and services at www.managedits.com

Triangle Tech Times

VACATION ALERT!

Before you head off for a little fun in the sun with your laptop tucked under your arm, keep this in mind: never

automatically connect to “any available network.” Not all internet connections are secure, so if you’re going to log in

to the company’s network, e-mail or other critical cloud apps that are hosting sensitive information, ONLY do so on a

trusted, secured WiFi and NEVER a public one. We recommend investing in a personal MiFi device that acts as a

mobile WiFi hotspot IF you’re going to be traveling a lot and accessing company info.

Second, turn off the ability to automatically connect for all your mobile devices and laptops. You will still be able to

connect manually, but it will prevent your laptop or device from connecting to a questionable network without your

consent or knowledge.

Finally, disable all printer and file-sharing options on your mobile devices. This is another way hackers can gain

access to your network. In an ideal world, you and your employees would take a true break from work, but if they

aren’t able to completely detach themselves, then at least require them to stay safe using the above tips.

Century 21 Becky Medlin Realty

CLIENT OF THE MONTH

Becky Medlin Realty has weathered the storm to emerge a leader in the Triangle’s real estate industry, serving Wake, Johnston and

Harnett counties. Becky still recalls the growing pains of a company that was born September 13, 1981.

“It was hard trying to do the business alone. I quickly realized I needed other agents,“ she admits. “Today, I’m truly blessed to have wonderful, caring brokers on my team.” To Becky, the Century 21 team is like her extended

family. To her eight grandchildren, Grandma’s house evokes scrumptious goodies ‘Mema’ loves to dish up herself. “That includes some big pots of food,” declared the tireless matriarch.

An avid supporter of the Fuquay-Varina community, Becky plays an active role in the Emergency Food Pantry, Kiwanis Club, the Chamber of Commerce and Fuquay-Varina Baptist Church, to

mention a few. The company also donates a portion of every closing commission to the Easter Seals Foundation.

Her motto helped her get through the tough times and made victory sweeter. “Work hard and get the job done; play hard and have fun and laughter,” Becky advises. After 35 years in business, she’s

still lovin’ it. All smiles for Becky and her little friend at an Easter Seals Foundation event

Page 4: 'DWD 0XVW 'R 1RZ 'LVDVWHU 6$)(7< -XQH·V %X]] ZRUG 7KLQJV … · 2016-11-18 · +duqhww frxqwlhv %hfn\ vwloo uhfdoov wkh jurzlqj sdlqv ri d frpsdq\ wkdw zdv eruq 6hswhpehu ´,w zdv

Get more free tips, tools and services at www.managedits.com

Triangle Tech Times June 2016

Business Continuity and Disaster Planning

If disaster were to strike your business today would you be able to survive it? "I don't feel truly protected with the data backup solution I have now, but I don't know how to change it." Do you worry about things like this? Featuring Palladium Continuum, our strategic Disaster Recovery solution that will allow you to rest assured your business and your Computer Hard Drive Backup system are safe and sound.

With Managed IT Solutions behind you for Disaster Recovery and Business Continuity Planning, you can rely on our experts to:

· Calm your fears about the disasters you can't control, with our Data Backup solution Palladium Continuum, we can safeguard you from all that's out there.

· Decrease downtime in the case of a disaster, with Recovery and Back Up strategies that will have your business running smoothly again in no time.

· Say goodbye to error-prone tape backups, with comprehensive Business Continuity plans that continually back you up.

We can give you the power to stop worrying about your irreplaceable business data and focus on running your business.

Want To Know For Sure If Your Current Backups Are Truly Keeping Your Data Secure?

OUR FREE BACKUP ANALYSIS WILL REVEAL THE TRUTH

At no charge, a consultant will come onsite and…

· Assess your current data protection including backup and restore procedures, tape rotations and maintenance schedule to see if there is anything jeopardizing your data’s security.

· Review procedures for storage and transportation of data. Many people don’t realize they damage their disks (and thereby corrupt their data) by improperly caring for their storage devices.

· Check your network backup to make sure they are accurately backing up all the critical files and information you would NEVER want to lose.

· Present a simple and easy-to-understand chart that will detail the makeup of your data, including the age and type of files you are backing up. Why should you care? Because many companies inadvertently use valuable computer storage to back up their employees’ personal MP3 files and movies.

· Discuss current data protection needs and clarify where your risks are. We know everyone has a different level of risk tolerance, and we want to make sure all the risks you’re taking with your data are by choice and not because of miscommuni-cation or accident.

Did You Know Managed IT Solutions Offers . . .

Page 5: 'DWD 0XVW 'R 1RZ 'LVDVWHU 6$)(7< -XQH·V %X]] ZRUG 7KLQJV … · 2016-11-18 · +duqhww frxqwlhv %hfn\ vwloo uhfdoov wkh jurzlqj sdlqv ri d frpsdq\ wkdw zdv eruq 6hswhpehu ´,w zdv

Shiny New Gadget Of The Month:

,I\RXKDYHQ¶WWULHG)LYHUUFRP\HW\RX¶UHLQIRUDWUHDW)LYHUULVDJOREDORQOLQHPDUNHWSODFHZKHUHIUHHODQFHUVRIIHUWRSHUIRUPDQDPD]LQJYDULHW\RIWDVNVDQGVHUYLFHVVWDUWLQJDWMXVW 1HHGDZKLWHERDUG-VW\OHYLGHRIRU\RXUZHEVLWH"$QHZORJR"+HOSFUHDWLQJD3RZHU3RLQWRU3UH]LSUHVHQWDWLRQ"7KHQ\RXQHHGWRFKHFNRXW)LYHUU 7RJHWVWDUWHGMXVWJRWR)LYHUUFRP$QGIRUEHVWUHVXOWVIROORZWKHVHILYHUXOHV 6WHHUFOHDURIEDGJLJV–%X\LQJKXQGUHGVRIEDFNOLQNVIRU\RXUZHEVLWHPLJKWVRXQGFRRO«7KHQDJDLQ\RXPLJKWEHLQIRUDQDVW\VXUSULVH,IDJLJVHHPVIDNHLWMXVWPLJKWEH«)LQGDQRWKHUJLJ

6KRSDURXQG–&RPSDUHGLIIHUHQWVHOOHUVDQGXVHWKH³)DYRULWHV´IHDWXUHWREXLOGDVKRSSLQJOLVWEHIRUH\RXEX\

([DPLQHFORVHO\–&KHFNUHYLHZVUHVSRQVHWLPHQXPEHURIJLJVFRPSOHWHGDQGJLJGHWDLOV4XHVWLRQV"$VNWKHVHOOHUEHIRUHEX\LQJ

&RPPXQLFDWHFOHDUO\–6DYHWLPHE\VSHOOLQJRXWLQH[DFWGHWDLOZKDW\RXZDQWLQ\RXURUGHU

$FFHSWQRWKLQJOHVVWKDQSHUIHFWLRQ–7RSVHOOHUVDUHRIWHQKDSS\WRPDNHUHYLVLRQVXQWLO\RX¶UHKDSS\

2ND\"5HDG\VHW«JRVDYHDERDWORDGRQ\RXUILUVW)LYHUUJLJ

Triangle Tech Times June 2016

Get More Free Tips, Tools and Services At Our Web Site: www.ManagedITS.com

$OO7KLV«)RU-XVW)LYH%XFNV"""

ǀĞƌLJŽŶĞůŽŽŬƐƐŽŵƵĐŚďĞƩĞƌǁŚĞŶƚŚĞLJƐŵŝůĞ–:ŝŵŵLJ&ĂůůŽŶŚŽƐƚŽĨƚŚĞůĞŐĞŶĚĂƌLJdŚĞdŽŶŝŐŚƚ^ŚŽǁ

tŚĂƚĂŵĞƚĞŽƌŝĐƌŝĚĞ:ŝŵŵLJ&ĂůůŽŶŚĂƐŚĂĚƚŽƚŚĞƚŽƉ

,ŽǁĚŝĚƚŚŝƐƐŽŶŽĨĂŶ/DŵĂĐŚŝŶĞƌĞƉĂŝƌŵĂŶŐĞƚƚŽƚŚĞĐŚĂŝƌŽŶĐĞŽĐĐƵƉŝĞĚďLJŵĂLJďĞƚŚĞŵŽƐƚůĞŐĞŶĚĂƌLJĮŐƵƌĞŝŶĐŽŵĞĚLJdsĨŽƌϯϬLJĞĂƌƐƐƚƌĂŝŐŚƚ:ŽŚŶŶLJĂƌƐŽŶ

,ĞĚŝĚŝƚƚŚƌŽƵŐŚĞdžĐĞƉƟŽŶĂůŶĞƚǁŽƌŬŝŶŐ /ŶƚŚĞƐƉĂŶŽĨĂďŽƵƚĮǀĞLJĞĂƌƐ:ŝŵŵLJǁĞŶƚĨƌŽŵĂ^ĂƚƵƌĚĂLJEŝŐŚƚ>ŝǀĞĂůƵŵƵŶƐƵĐĐĞƐƐĨƵůůLJŶĂǀŝŐĂƟŶŐ,ŽůůLJǁŽŽĚƚŽĂůĂƚĞ-ŶŝŐŚƚƐƚĂƌĂŶĚŚŽƐƚŽĨEƐdŚĞdŽŶŝŐŚƚ^ŚŽǁŽŶĞŽĨƚŚĞŵŽƐƚƌĞƐƉĞĐƚĞĚĨƌĂŶĐŚŝƐĞƐŝŶĞŶƚĞƌƚĂŝŶŵĞŶƚdŚŝƐĚŝĚŶŽƚŚĂƉƉĞŶďLJĂĐĐŝĚĞŶƚ

&ĂůůŽŶƐŵĞƚĞŽƌŝĐƌŝƐĞŝƐƉĂƌƚůLJĚƵĞƚŽŚŝƐŝŶƚĞŶƐĞĨŽĐƵƐŽŶĚĞǀĞůŽƉŝŶŐƌĞůĂƟŽŶƐŚŝƉƐǁŝƚŚƉĞŽƉůĞǁŚŽĐŽƵůĚĂĚǀĂŶĐĞŚŝƐĐĂƌĞĞƌ

ŶŽƚŚĞƌŬĞLJ&ĂůůŽŶǁŽƌŬĞĚŚŝƐďƵƩŽī tŚŝůĞƐƟůůĂĐŽŵƉƵƚĞƌ-ƐĐŝĞŶĐĞŵĂũŽƌĂƚůďĂŶLJƐŽůůĞŐĞŽĨ^ĂŝŶƚZŽƐĞŚĞƉĞƌĨŽƌŵĞĚĐŽŵĞĚLJĂƚƐŵĂůůĐůƵďƐĂŶĚŽďƐĞƐƐĞĚĂďŽƵƚƚŚĞĐŽŵĞĚLJŝŶĚƵƐƚƌLJ

dŚƌŽƵŐŚĂĐŽŶŶĞĐƟŽŶǁŝƚŚŚŝƐĨŽƌŵĞƌĞŵƉůŽLJĞƌĂƚĂEĞǁzŽƌŬĂůƚĞƌŶĂƟǀĞŶĞǁƐǁĞĞŬůLJŚŝƐĂƵĚŝƟŽŶƚĂƉĞƌĞĂĐŚĞĚ,ŽůůLJǁŽŽĚĂŐĞŶƚZĂŶĚŝ^ŝĞŐĞůǁŚŽŚĂĚŝŶƐǁŝƚŚƚŚĞĐƌŽǁĚĂƚ^ĂƚƵƌĚĂLJEŝŐŚƚ>ŝǀĞ

^ŝĞŐĞůĨŽƵŶĚϮϭ-LJĞĂƌ-ŽůĚ&ĂůůŽŶƐƉĞƌĨŽƌŵĂŶĐĞƚŽďĞĐŚĂƌŵŝŶŐůLJĂŵĂƚĞƵƌďƵƚƐŚĞĐŽƵůĚƐĞĞƚŚĂƚŚĞǁĂƐŶĂƚƵƌĂůůLJƚĂůĞŶƚĞĚ^ŚĞŐĂǀĞŚŝŵĂĐĂůůĂŶĚǁĂƐƐƵƌƉƌŝƐĞĚƚŽŚĞĂƌĂŌĞƌŝŶƚƌŽĚƵĐŝŶŐŚĞƌƐĞůĨZĂŶĚŝ^ŝĞŐĞů/ŬŶŽǁǁŚŽLJŽƵĂƌĞ ZĂŶĚŝǁĂƐƐŽŝŵƉƌĞƐƐĞĚďLJŚŝƐŬŶŽǁůĞĚŐĞ

ŽĨƚŚĞĐŽŵĞĚLJŝŶĚƵƐƚƌLJĂŶĚĞŶƚŚƵƐŝĂƐŵƚŚĂƚƐŚĞĂŐƌĞĞĚƚŽƚĂŬĞŚŝŵŽŶĂƐĂĐůŝĞŶƚtŝƚŚ^ŝĞŐĞůƐĐŽŶŶĞĐƟŽŶƐ&ĂůůŽŶǁĂƐĂďůĞƚŽĞǀĞŶƚƵĂůůLJŐĞƚŚŝƌĞĚĂƐĂĐĂƐƚŵĞŵďĞƌǁŝƚŚ^E>ŝŶϭϵϵϴ

ƚ^E>ŚĞĚĞǀĞůŽƉĞĚƚŚĞƌĞůĂƟŽŶƐŚŝƉƚŚĂƚǁŽƵůĚĚĞĮŶĞŚŝƐĐĂƌĞĞƌ dŚĞƐŚŽǁƐĐƌĞĂƚŽƌ>ŽƌŶĞDŝĐŚĂĞůƐŝƐƐŽƉŽǁĞƌĨƵůĂŶĚƌĞƐƉĞĐƚĞĚŝŶƚŚĞŝŶĚƵƐƚƌLJƚŚĂƚĐĂƐƚŵĞŵďĞƌƐĂƌĞŽŌĞŶŝŶƟŵŝĚĂƚĞĚďLJŚŝŵƐĂƌŽŽŬŝĞ&ĂůůŽŶǁĂƐŶŽĚŝīĞƌĞŶƚďƵƚŚĞǁĂŶƚĞĚƚŽďĞĨƌŝĞŶĚDŝĐŚĂĞůƐ^ŽĂŌĞƌĞǀĞƌLJƐŚŽǁŚĞǁĞŶƚŽǀĞƌƚŽDŝĐŚĂĞůƐĂŶĚƚŚĂŶŬĞĚŚŝŵĨŽƌƚŚĞƐŚŽǁ

DŝĐŚĂĞůƐĚĞǀĞůŽƉĞĚĂƌĂƌĞĨƌŝĞŶĚƐŚŝƉǁŝƚŚ&ĂůůŽŶ&ŽůůŽǁŝŶŐƚŚĞĚƌĂŵĂŽĨŽŶĂŶKƌŝĞŶƐƐŚŽƌƚƐƟŶƚĂƐŚŽƐƚŽĨdŚĞdŽŶŝŐŚƚ^ŚŽǁDŝĐŚĂĞůƐĚĞĐŝĚĞĚƚŚĂƚŚŝƐƚƌƵƐƚĞĚ&ĂůůŽŶǁŽƵůĚƚĂŬĞƚŚĞƌĞŶŽǁŶĞĚƉŽƐŝƟŽŶ

&ĂůůŽŶŵĂĚĞĂƉŽŝŶƚŽĨĐŽŶŶĞĐƟŶŐǁŝƚŚĨŽƌŵĞƌdŽŶŝŐŚƚ^ŚŽǁŚŽƐƚ:ĂLJ>ĞŶŽĂŶĚǁŽƵůĚĂƐŬĨŽƌĂĚǀŝĐĞ>ĞŶŽƐĂŝĚDŽƐƚƉĞŽƉůĞŝŶƐŚŽǁďƵƐŝŶĞƐƐƚŚŝŶŬƚŚĞLJŬŶŽǁĞǀĞƌLJƚŚŝŶŐdŚĞLJĚŽŶƚƌĞĂůůLJůŝƐƚĞŶƚŽƚŚĞŽƚŚĞƌƉĞƌƐŽŶZĞƐƉĞĐƞƵůŝƐƚŚĞďĞƐƚǁŽƌĚ/ĐĂŶƵƐĞĨŽƌ:ŝŵŵLJ

,ŝƐĂƉƉƌŽĂĐŚǁŽƌŬĞĚ ^ŝŶĐĞƐƚĂƌƟŶŐŝŶ&ĞďƌƵĂƌLJϮϬϭϰ&ĂůůŽŶŚĂƐĂƩƌĂĐƚĞĚĂƌŽƵŶĚϰŵŝůůŝŽŶǀŝĞǁĞƌƐĞĂĐŚŶŝŐŚƚǁŝƚŚĂŵƵĐŚŚŝŐŚĞƌƐŚĂƌĞŽĨƚŚĞϭϴ-ϰϵĚĞŵŽŐƌĂƉŚŝĐƚŚĂŶŚŝƐƉƌĞĚĞĐĞƐƐŽƌ

tŚĂƚ&ĂůůŽŶĚŝĚŝƐĂͿŚĞǁŽƌŬĞĚŚĂƌĚ;ůĞƚƐŶŽƚĨŽƌŐĞƚƚŚĂƚͿĂŶĚďͿŚĞŶĞƚǁŽƌŬĞĚďƌŝůůŝĂŶƚůLJďLJĂƐŬŝŶŐƋƵĞƐƟŽŶƐŽĨŽƚŚĞƌƐůŝƐƚĞŶŝŶŐĂĐƟŶŐŽŶƚŚĞŝƌĂĚǀŝĐĞƐŚŽǁŝŶŐŐƌĂƟƚƵĚĞĂŶĚďĞŝŶŐĂŐĞŶƵŝŶĞůLJŐŽŽĚŚƵŵĂŶďĞŝŶŐ

^ŽǁŚŽĂƌĞƚŚƌĞĞĐŽŶŶĞĐƟŽŶƐLJŽƵĚƌĞĂŵŽĨŶĞƚǁŽƌŬŝŶŐǁŝƚŚŝŶŽƌĚĞƌƚŽďŽŽƐƚLJŽƵƌƐƵĐĐĞƐƐ

Conquering Connecting

'DUUHQ+DUG\LVWKHYLVLRQDU\IRUFHEHKLQG68&&(66PDJD]LQHDVWKH)RXQGLQJ3XEOLVKHUDQG(GLWRUDQGLVWKH1HZ<RUN7LPHVDQG:DOO6WUHHW-RXUQDOEHVWVHOOLQJDXWKRURIZKDWKDVEHHQFDOOHG³WKHPRGHUQGD\7KLQNDQG*URZ5LFK´7KH&RPSRXQG(IIHFW—-XPSVWDUW<RXU,QFRPH<RXU/LIH<RXU6XFFHVVZZZ7KH&RPSRXQG(IIHFWFRPDQGWKHZRUOG-ZLGHPRYHPHQWWRRQERDUGPLOOLRQQHZHQWUHSUHQHXUVWKURXJKKLVODWHVWERRN7KH(QWUHSUHQHXU5ROOHU&RDVWHU--:K\1RZLVWKH7LPHWR-RLQ7KH5LGHZZZ5ROOHU&RDVWHU%RRNFRP$FFHVV'DUUHQZZZ'DUUHQ+DUG\FRPDQGJHWIUHHGDLO\PHQWRULQJZZZ'DUUHQ'DLO\FRP

Page 6: 'DWD 0XVW 'R 1RZ 'LVDVWHU 6$)(7< -XQH·V %X]] ZRUG 7KLQJV … · 2016-11-18 · +duqhww frxqwlhv %hfn\ vwloo uhfdoov wkh jurzlqj sdlqv ri d frpsdq\ wkdw zdv eruq 6hswhpehu ´,w zdv

Triangle Tech Times June 2016

Get More Free Tips, Tools and Services At Our Web Site: www.ManagedITS.com

Hate waiting for pages to load on your smartphone? There's an "AMP" for that. And no, that’s not a misspelling of “app”…it’s an acronym for Accelerated Mobile Pages. As you may have noticed, there’s a little problem with the mobile web… You click a link on your smartphone, eager to consume the content… What shows up is a spastic jumble of jerky images, videos and ads as the page loads…eventually…if you care to wait. (40% of people bail after three seconds.) Google’s new AMP Project aims to fix that. “AMPed” pages load almost instantly with a simple, easy-to-consume format. To see it for yourself, pull out your smartphone and visit g.co/ampdemo. -Copyblogger

Encryption in The Cloud - How safe is your data? Cloud technology can add a whole new layer of protection to your data backup system. However, it’s important to recognize that there’s one key difference between cloud service providers that will determine how safe your data is. When stored data – aka “data at rest” (vs. data in transit) – is encrypted, some cloud services keep the decryption key in their software. If hackers get that key, they can get your data. That’s why it’s important when selecting a cloud service

provider to be informed about their security measures. Before choosing, compare encryption methods. It pays to know that your company’s digital property is safe – and will be there when you need it. -TechAdvisory.org

Virtual Reality - Useless gimmick, or valuable marketing tool for your business? According to investment firm Piper Jaffray, there will be $5.4 billion worth of virtual reality devices on the market by 2025. The uses for small business are limited only by imagination. A roofing company, for instance, could, with this technology, give their prospective customers a live virtual tour of their roof, demonstrating its condition and places where they need to replace shingles – without having to climb up on it. A roofer could also show a prospective customer what various colored shingles would

actually look like on the roof by placing a hologram on it. Think VR is some far-fetched future techno-dream? Pull out your smartphone and check out “Monocle” on the Yelp app. -MarketingLand.com

Laptop, Tablet… Or 2-in-1? Are you toting around two devices – a laptop to get serious work done and a tablet for a little Baldur’s Gate or Facebook action? If you’re in the market for a new laptop or tablet, it’s time to consider getting a 2-in-1. Like an SUV or Swiss Army knife, 2-in-1’s offer supreme versatility. Windows 10 was built for these machines, and with prices, power and battery life now falling in line with laptops, you can save time, money and weight with a 2-in-1. Unless you’re a high-end gamer or graphics pro, you owe it to yourself to check out the latest versions of these new mobile gadgets. -Laptop Mag